UM

Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
Adaptive polar based filtering method for image copy-move forgery detection Conference paper
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
Authors:  Bi X.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:4/0  |  Submit date:2019/02/14
Adaptive polar based filtering method  Copy-move forgery  Polar distribution  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:1153/263  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid  
Robust block and gray-level histogram based watermarking scheme Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Authors:  Pun C.-M.;  Yuan X.
Favorite  |  View/Download:10/0  |  Submit date:2019/02/14
Block histogram  Geometric attack  Gray-level histogram  JPEG compression  Median filtering  Watermarking  
Distributed autonomous agents for Chinese document image segmenation Journal article
International Journal of Pattern Recognition and Artificial Intelligence, 1998,Volume: 12,Issue: 1,Page: 97-118
Authors:  Liu J.;  Tang Y.Y.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/11
Autonomous agents  Distributed image processing  Document segmentation  
Evolutionary image processing Conference paper
Proceedings of the IEEE Conference on Evolutionary Computation, ICEC
Authors:  Liu Jiming;  Tang Y.Y.
Favorite  |  View/Download:5/0  |  Submit date:2019/02/11